{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:15:47Z","timestamp":1762506947310,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,11,13]],"date-time":"2016-11-13T00:00:00Z","timestamp":1478995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11,13]]},"DOI":"10.1145\/2988272.2988280","type":"proceedings-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T19:39:50Z","timestamp":1478288390000},"page":"129-133","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Internet of Things"],"prefix":"10.1145","author":[{"given":"Sabrina","family":"Sicari","sequence":"first","affiliation":[{"name":"Universit\u00e0 degli Studi dell'Insubria, Varese, Italy"}]},{"given":"Alessandra","family":"Rizzardi","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi dell'Insubria, Varese, Italy"}]},{"given":"Daniele","family":"Miorandi","sequence":"additional","affiliation":[{"name":"U-Hopper, Trento, Italy"}]},{"given":"Alberto","family":"Coen-Porisini","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi dell'Insubria, Varese, Italy"}]}],"member":"320","published-online":{"date-parts":[[2016,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.03.030"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"R. Di Pietro L. Mancini and S. Jajodia. Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Netw. 1.  R. Di Pietro L. Mancini and S. Jajodia. Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Netw. 1.","DOI":"10.1016\/S1570-8705(03)00046-5"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.02.008"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.01.006"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"e_1_3_2_1_7_1","first-page":"58","author":"Sicari S.","year":"2016","unstructured":"S. Sicari , A. Rizzardi , D. Miorandi , C. Cappiello , and A. Coen-Porisini . A secure and quality-aware prototypical architecture for the internet of things. Information Systems , 58 , 2016 . S. Sicari, A. Rizzardi, D. Miorandi, C. Cappiello, and A. Coen-Porisini. A secure and quality-aware prototypical architecture for the internet of things. Information Systems, 58, 2016.","journal-title":"Information Systems"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.04.010"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.05.009"},{"key":"e_1_3_2_1_10_1","first-page":"2012","author":"Yu H.","year":"2012","unstructured":"H. Yu , J. He , T. Zhang , and P. Xiao . A group key distribution scheme for wireless sensor networks in the internet of things scenario. International Journal of Distributed Sensor Networks , 2012 , 2012 . H. Yu, J. He, T. Zhang, and P. Xiao. A group key distribution scheme for wireless sensor networks in the internet of things scenario. International Journal of Distributed Sensor Networks, 2012, 2012.","journal-title":"International Journal of Distributed Sensor Networks"}],"event":{"name":"MSWiM '16: 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Malta Malta","acronym":"MSWiM '16"},"container-title":["Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2988272.2988280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2988272.2988280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:36Z","timestamp":1750218636000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2988272.2988280"}},"subtitle":["Security in the Keys"],"short-title":[],"issued":{"date-parts":[[2016,11,13]]},"references-count":10,"alternative-id":["10.1145\/2988272.2988280","10.1145\/2988272"],"URL":"https:\/\/doi.org\/10.1145\/2988272.2988280","relation":{},"subject":[],"published":{"date-parts":[[2016,11,13]]},"assertion":[{"value":"2016-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}